Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,434,866 papers from all fields of science
Search
Sign In
Create Free Account
Key (cryptography)
Known as:
Encryption key
, Cryptographic key
, Key (cryptology)
Expand
In cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm. For encryption…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Authenticated Identity Body
Authentication
BEAR and LION ciphers
Backup
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2004
Highly Cited
2004
SAKM: a scalable and adaptive key management approach for multicast communications
Y. Challal
,
H. Bettahar
,
A. Bouabdallah
CCRV
2004
Corpus ID: 16771834
Multicasting is increasingly used as an efficient communication mechanism for group-oriented applications in the Internet. In…
Expand
Review
2000
Review
2000
Overview of IEEE 802.11b Security
Sultan Weatherspoon
2000
Corpus ID: 15065327
There is much regulatory and standards work in the area of security, especially in wireless. The wireless LAN standard IEEE 802…
Expand
Highly Cited
1994
Highly Cited
1994
Trellis-coded continuous-phase frequency-shift keying with ring convolutional codes
R. H. Yang
,
Desmond P. Taylor
IEEE Transactions on Information Theory
1994
Corpus ID: 206393460
Trellis-coding techniques are applied to continuous-phase frequency-shift keying (CPFSK). A new coding scheme based on…
Expand
Review
1993
Review
1993
Defining, designing, and evaluating digital communication systems
B. Sklar
IEEE Communications Magazine
1993
Corpus ID: 36113946
The fundamental relationships in defining, designing, and evaluating digital communication system performance are reviewed. The…
Expand
Highly Cited
1989
Highly Cited
1989
Design of coded CPFSK modulation systems for bandwidth and energy efficiency
B. Rimoldi
IEEE Transactions on Communications
1989
Corpus ID: 8247167
Consideration is given to the problems related to the design of M-ary continuous-phase frequency-shift keying (CPFSK) systems…
Expand
Highly Cited
1986
Highly Cited
1986
Noncoherent Hybrid DS-SFH Spread-Spectrum Multiple-Access Communications
E. Geraniotis
IEEE Transactions on Communications
1986
Corpus ID: 28117234
The performance of noncoherent reception in synchronous and asynchronous hybrid direct-sequence/slow-frequency-hopped spread…
Expand
Highly Cited
1985
Highly Cited
1985
Performance of Noncoherent Direct-Sequence Spread-Spectrum Multiple-Access Communications
E. Geraniotis
IEEE J. Sel. Areas Commun.
1985
Corpus ID: 41617772
The performance of noncoherent reception in direct-sequence spread-spectrum multiple-access communications systems is…
Expand
Highly Cited
1984
Highly Cited
1984
An improved algorithm for evaluating trellis phase codes
M. G. Mulligan
,
S. G. Wilson
IEEE Transactions on Information Theory
1984
Corpus ID: 1221025
A method is described for evaluating the minimum distance parameters of trellis-phase codes, including continuous phase frequency…
Expand
Highly Cited
1983
Highly Cited
1983
XPSK: A New Cross-Correlated Phase-Shift Keying Modulation Technique
S. Kato
,
K. Feher
IEEE Transactions on Communications
1983
Corpus ID: 62423770
A new modulation technique, cross-correlated phase-shift keying ( XPSK ), is introduced. XPSK is a band-limited offset QPSK…
Expand
Highly Cited
1977
Highly Cited
1977
Simplified MSK Signaling Technique
F. Amoroso
,
J. Kivett
IEEE Transactions on Communications
1977
Corpus ID: 62692217
Modulation and demodulation in the minimum (frequency)-shift keying (MSK) format are reduced to the form of coherent biphase…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE